Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 8
Research on Communication Failure in Mobile Agent Systems
zhou jing yang ; chen zuo lue ; xu ping ; lu sang zuo ; chen dao xu
..............page:108-111
Research on Security of JavaCard based Mobile Agent System
chen zhi xian ; wang shao zuo ; wang ru chuan ; sun zhi xin
..............page:112-113,116
Parallel Data Ming Algorithm of Sequential Associations
li qing hua ; zhao feng
..............page:114-116
A Novel Algorithm for Mining Frequent Patterns Directly in Trans-Tree
fan ming ; wang bing zheng
..............page:117-120,123
Data Mining in Interval Valued Decision Table
wang zuo ; liu san yang ; zhang jie
..............page:121-123
Prediction of Time Series Based on Least Squares Support Vector Machines
zhu jia yuan ; duan bao jun ; zhang heng xi
..............page:124-125
Predicting Credibility Based on Support Vector Regression
sun de shan ; wu jin pei
..............page:126-127
The Auction and its Application in Multi-Agent System
jin ; shi chun yi
..............page:104-107
Survey on Multi-Agent Collaborative Problem Solving
zhang xin liang ; shi chun yi
..............page:100-103
Application of Multicasting in Surveillance Systems
su shi mei ; li hai fang
..............page:96-99
The Study of Several Key Technologies of the Personal and Active Information Service System Based on XML Technology
chen jun jie ; guo yong ming ; song han tao ; lu yu chang ; yu xue li
..............page:93-95
A Weight Algorithm for Similarity Comparison of Inconsistency Data in Integrating Data
zhang yan qiu ; xu liu tong ; wang bai
..............page:92,封四
A Survey on The Technology & Application of Grid Computing
hong xue hai ; xu zhuo qun ; ding wen kui
..............page:1-5,9
XML Database Researching
qin jie ; yang shu qiang ; zuo wen hua
..............page:6-9
The Research of Information Filtering
mao ying ; zhou yuan yuan ; wang ji cheng ; zhang fu yan
..............page:10-12,23
Survey on Probability Models of Information Retrieval
xing yong kang ; ma shao ping
..............page:13-17
The Intelligent Treatment Technology in Automatic Text Classification
sun jin wen ; xiao jian guo
..............page:18-20
The Model of DNA Computing
li yan ; wang xiu feng
..............page:21-23
Formal Description and Analysis of Security Protocols
song zhen ; zhang yan ; li zhou jun ; chen huo wang
..............page:24-27,36
State of the Art of Prefechting Technique
cao xin ping ; liu mei hua ; han zhen ; gu zhi min ; zhang jian zuo
..............page:28-30,55
A Survey of Routing Protocols Based on the Internet
he hong ; yuan sheng zhong ; ma shao han
..............page:31-33
Research of Protocol Converter Between Heterogeneous Networks
zhao xin you ; gu tian long ; dong rong sheng ; li feng ying
..............page:34-36
Optimization Algorithm on Network Based on Capacity Expansion of the Mimimum Cutset
liu yu hua ; mao jing zhong ; xiao de bao
..............page:37-39
The Application and Research of WLAN Techniques in Campus Network
hu xin he ; yin guang hui ; chen ying
..............page:40-42
A Survey on the Development of Intrusion Detection System
zhang xiang feng ; sun yu fang
..............page:45-49,155
A Novel IDS Evaluation Model Based by Bayes Estimation
luo guang chun ; lu xian liang ; li jiong ; zhang jun
..............page:50-51
Research and Application of Secure Multi-party Computation Protocols
li qiang ; yan hao ; chen ke fei
..............page:52-55
A Dynamic Secret Sharing Scheme Based on Key Matrix
yan hao ; chen ke fei
..............page:56-58,175
A Review of Watermarking Applications,their Properties and Benchmarking
zhang hong bin ; zhang fan
..............page:59-63
An Overview of XML Data Management Based on an RDBMS
wan chang xuan ; liu yun sheng
..............page:64-68,72
XML Database Storing Strategy Based on Schema Path Analysis
zhu zhen ; zuo chun
..............page:69-72
An Approach for ORDBMS Architecture
li ming ; ye xiao jun
..............page:73-75,81
A Research on TWO-Level Granularity in Multimedia on Demand System
liu xiao guang ; wang gang ; wu ying ; liu
..............page:76-77
A Web News Information Publish Model With Multi-Format and Multi-Language Capability
ma lu ; xu bin ; wang ke hong
..............page:78-81
A Reference Model for E-Commerce
liu zuo ; peng qin ke ; shen jun yi
..............page:82-84,95
Building the Metadata Services Architecture of Digital City
wang zuo ; li zuo ; dong bao qing ; li hao chuan
..............page:85-87,107
An Improved SMO Algorithm
zhang zhao ; huang guo xing ; bao zuo
..............page:128-129,133
Study on Decision Model Based on Extension Set
wang hong wei ; wu jia chun ; jiang zuo
..............page:130-133
Choosing a Suitable Prior for Bayesian Learning Based on Bayesian Discrimination
hu zhen yu ; lin shi min ; lu yu chang
..............page:134-135
Study of Target Classification in Situation Assessment
li wei sheng ; wang bao shu
..............page:136-138
Input Variables Selection of Forecasting Model Based on Neural Network
yang kui he ; wang bao shu ; zhao ling ling
..............page:139-140,143
Implementation of Adaptive Multiple Bit Mutation Genetic Algorithm
wang ji yi ; wu yan xian
..............page:141-143
Study on Modeling Method Based on Particle System
zhang qin ; wu hui zhong ; zhang jian
..............page:144-146
An Novel Method of Emdedding for Image Watermark
hu yu ping ; yu sheng sheng ; zhou jing li ; shi lei
..............page:147-149
Research on Software Rejuvenation
li zheng ; wan qun li ; xu man wu
..............page:150-155
Process Pattern Based Software Process Framework
liang yi zhi ; wang yan zhang ; liu yun fei ; zuo xu dong
..............page:156-161
Software Vulnerability Analysis
li xin ming ; li yi ; xu xiao mei ; han cun bing
..............page:162-165
Role-Based Access Control Model and its Implementation in Operating System
liu wei ; sun yu fang
..............page:166-168
Reasearch and Improvement on Mutex of Linux
zhao hui bin ; li xiao qun ; sun yu fang ; ye yi min
..............page:169-171
FTDSS:High Fault-Tolerance Distributed Shared Storage Mechanism
wei qing song ; lu xian liang ; lei yu
..............page:172-175
The Parallel Algorithm of Computing Converse Matrix on the Simplified LogP Model
zeng qing hua ; sun shi xin ; chen tian zuo
..............page:176-177,184
A Liquid Crystal Displayed Method of I/O Bus Driving Based on CPLD
cheng xiao dong ; zheng wei min ; tang zhi min
..............page:178-179
Performance Analysis of Embedded Processor
sheng yong jie ; liu bo qin ; chen zhang long
..............page:180-181
Complicated Electric Circuit P-T Calculus Model Based on VHDL
liu dan fei ; li man yi ; guo jin huai
..............page:182-184